Login/Register
Stats
Combats
The Web War
CyberSec Drills
Recent
Search
Radar
News
Cybersec
Purple
MorningStar
Books
Attack Maps
ThreatButt
Fortiguard
Kaspersky
Multi-Search
Purple News
Feed list:
Reddit/r/redteamsec
Reddit/r/blueteamsec
Reddit/r/websecresearch
BlackhillsInfosec
Wildwesthackinfest
DarkNet
Kitsploit
blog.vulners
Medium.com
Twitter
Reddit/r/redteamsec
Reddit/r/blueteamsec
BlackhillsInfosec
Introduction to Zeek Log Analysis
Indecent Exposure: Your Secrets are Showing
Creating Burp Extensions: A Beginner’s Guide
Pitting AI Against AI: Using PyRIT to Assess Large Language Models (LLMs)
The Top Ten List of Why You Got Hacked This Year (2023/2024)
ICS Hard Knocks: Mitigations to Scenarios Found in ICS/OT Backdoors & Breaches
Intro to Data Analytics Using SQL
Finding Access Control Vulnerabilities with Autorize
The Detection Engineering Process
Cyber Risk Lessons We Can Learn From Hurricane Preparedness
Wildwesthackinfest
Throwback Thursday | I Got an Alert, Now What?
Throwback Thursday | Why Developers Hate Infosec
Throwback Thursday | Exploiting Persistent XSS
Throwback Thursday | Hackers in the Boardroom
Throwback Thursday | Tool Demo – Riverside
Throwback Thursday | The Fools Gold Rush to Compliance
Throwback Thursday | Is the PKI Sky Falling?
Throwback Thursday | What’s Old is Gold
Throwback Thursday | Wireless Attack Killchain for N00bs
Throwback Thursday | Six Things No One !@#$%^& Told Me About Pentesting
Reddit/r/websecresearch
DarkNet
KitSploit
SafeLine - Serve As A Reverse Proxy To Protect Your Web Services From Attacks And Exploits
PolyDrop - A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit
Secator - The Pentester'S Swiss Knife
Damn-Vulnerable-Drone - An Intentionally Vulnerable Drone Hacking Simulator Based On The Popular ArduPilot/MAVLink Architecture, Providing A Realistic Environment For Hands-On Drone Hacking
File-Unpumper - Tool That Can Be Used To Trim Useless Things From A PE File Such As The Things A File Pumper Would Add
Mass-Assigner - Simple Tool Made To Probe For Mass Assignment Vulnerability Through JSON Field Modification In HTTP Requests
Imperius - Make An Linux Kernel Rootkit Visible Again
BYOSI - Evade EDR's The Simple Way, By Not Touching Any Of The API's They Hook
Psobf - PowerShell Obfuscator
ModTracer - ModTracer Finds Hidden Linux Kernel Rootkits And Then Make Visible Again
DockerSpy - DockerSpy Searches For Images On Docker Hub And Extracts Sensitive Information Such As Authentication Secrets, Private Keys, And More
Ashok - A OSINT Recon Tool, A.K.A Swiss Army Knife
CloudBrute - Awesome Cloud Enumerator
Hfinger - Fingerprinting HTTP Requests
VulnNodeApp - A Vulnerable Node.Js Application
XMGoat - Composed of XM Cyber terraform templates that help you learn about common Azure security issues
Extrude - Analyse Binaries For Missing Security Features, Information Disclosure And More...
BokuLoader - A Proof-Of-Concept Cobalt Strike Reflective Loader Which Aims To Recreate, Integrate, And Enhance Cobalt Strike's Evasion Features!
Volana - Shell Command Obfuscation To Avoid Detection Systems
CyberChef - The Cyber Swiss Army Knife - A Web App For Encryption, Encoding, Compression And Data Analysis
NativeDump - Dump Lsass Using Only Native APIs By Hand-Crafting Minidump Files (Without MinidumpWriteDump!)
Sttr - Cross-Platform, Cli App To Perform Various Operations On String
PIP-INTEL - OSINT and Cyber Intelligence Tool
Thief Raccoon - Login Phishing Tool
X-Recon - A Utility For Detecting Webpage Inputs And Conducting XSS Scans
Blog.vulners.com
Medium.com
Google Dork: #red-team #red-teaming
#red-teaming
#red-team
#redteaming
#redteam
#pentest
#pentesting
#bug-bounty
#bugbounty
Twitter
#pentest, #networkpetnest, #netpentest
#redteam
#blueteam
#appsec
#bugbountytips